Security in the upside down

Security in the upside down

Almost every day we check our bank account from our smartphones, we buy products in Amazon, we send private messages to our family and colleagues, and so on. We do this because we know that it’s safe, that no one can steal our credit card number or read our messages. Information security is the discipline […]

Siete pasos para documentar sin morir en el intento

Siete pasos para documentar sin morir en el intento

Documentar o no documentar, he allí el dilema. En entornos altamente especializados como el del software, la elaboración de documentación técnica suele ser un quebradero de cabeza o un “mal necesario” para aquellos que subordinan las letras al mundo de los números y la lógica algorítmica. No obstante, aunque está claro que, como se proclama […]

Improving VM performance in OpenStack: NUMA and CPU Pinning

Improving VM performance in OpenStack: NUMA and CPU Pinning

Today we are going to see how to improve the performance of a VM running in OpenStack. Memory has a large impact in the performance of workload. This affirmation is specially true if the workload is running on a VM, so it’s necessary to be careful with the memory and NUMA if the machine supports it.   But wait! What is NUMA? […]

RSA: how maths will protect us while P!=NP

RSA: how maths will protect us while P!=NP

Introduction In a previous post we talked about how mathematics could help us become better programmers, this time we will talk about how mathematics is the basis of global cyber security thanks to RSA cryptography. The importance of cryptography has been very large through history. Mainly it has been used by militaries and governments, being able […]